Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    09-08-2024 04:09

General

  • Target

    f5e88136e2a24b31dfd9886ffb23016e0c9d8f91b42d1d6850d877d7e6ef9398.exe

  • Size

    115KB

  • MD5

    0ed4f210fc9b9623084985748de7c641

  • SHA1

    2f750dd6bbccbb502217905e3a6ce2d894a41f85

  • SHA256

    f5e88136e2a24b31dfd9886ffb23016e0c9d8f91b42d1d6850d877d7e6ef9398

  • SHA512

    99a49981d912fd4b122008f58ba4096cb687bc502ddef26f3b99b2c7c8fc46977fa96a41b0e88a64fb5117f00a06e125a339c3d789bd57b7c45bd2c996597dfa

  • SSDEEP

    3072:6e7WpMaxeb0CYJ97lEYNR73e+eKZOf7fb:RqKvb0CYJ973e+eKZOf7fb

Score
9/10

Malware Config

Signatures

  • Renames multiple (3455) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f5e88136e2a24b31dfd9886ffb23016e0c9d8f91b42d1d6850d877d7e6ef9398.exe
    "C:\Users\Admin\AppData\Local\Temp\f5e88136e2a24b31dfd9886ffb23016e0c9d8f91b42d1d6850d877d7e6ef9398.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1385883288-3042840365-2734249351-1000\desktop.ini.tmp

    Filesize

    115KB

    MD5

    992ba2367ce2830cd42d252598668e43

    SHA1

    d1469a3a0973c5ad17007cbd4b06c219ed3f0261

    SHA256

    8cdb89f23270e3820c071fca609f717d88a7f1dba2cae0ec5f5d53b0246c1a60

    SHA512

    b7a9ac375627785c6788641a2483a75a2fcc37036e935b2efa50a46f5dd5e8e9ac4aae74343cbff07454145752b72d2c6602e002d5f840136a3d1e5a66b51576

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    124KB

    MD5

    61a6198cb81d071aac24eab1db41317a

    SHA1

    21e33bafde3d760845136ace17f61796007fba9d

    SHA256

    8ed98ae41627286189622822e84cbdbe08235e5ccc9e6db24ba54bbc064a0e8f

    SHA512

    6d888790b751195862cd114285d97bcf46147f8902a091a8c41731e9e3f42a14731c95e3ac303a3493281d40060d52150aae94b681a668cbdb78e536f4126828